Veritas VCS-278 Question Answer
Which two options are determined by the Security Level? (Choose two.)
if the CA fingerprint needs to be confirmed during an installation or upgrade
if a host requires a token during installation
the idle log off timeout for the NetBackup Administration Console
whether insecure communication with NetBackup 8.0 and earlier hosts is allowed
how often CRLs are updated
TESTED 06 Apr 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved